Results 71 to 80 of about 10,775 (222)

TOP: A Combined Logical and Physical Obfuscation Method for Securing Networks-on-Chip Against Reverse Engineering Attacks

open access: yesIEEE Access
The Network-on-Chip (NoC) plays an important role in high-speed and efficient communication in System-on-Chip architectures. However, the NoC topology can be extracted through reverse engineering attacks with the goal of making illegal copies or ...
Mona Hashemi   +2 more
doaj   +1 more source

x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4

open access: yesIEEE Access, 2020
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult.
Seokwoo Choi   +3 more
doaj   +1 more source

Breeding 5.0: Artificial intelligence (AI)‐decoded germplasm for accelerated crop innovation

open access: yesJournal of Integrative Plant Biology, EarlyView.
ABSTRACT Crop breeding technologies are vital for global food security. While traditional methods have improved yield, stress tolerance, and nutrition, rising challenges such as climate instability, land loss, and pest pressure now demand new solutions.
Jiayi Fu   +4 more
wiley   +1 more source

From observation to understanding: A multi‐agent framework for smart microscopy

open access: yesJournal of Microscopy, EarlyView.
Abstract Smart microscopy represents a paradigm shift in biological imaging, moving from passive observation tools to active collaborators in scientific inquiry. Enabled by advances in automation, computational power, and artificial intelligence, these systems are now capable of adaptive decision‐making and real‐time experimental control.
P. S. Kesavan, Pontus Nordenfelt
wiley   +1 more source

Cancer and Capitalism: Towards a Critical Sociological Agenda

open access: yesSociology Lens, EarlyView.
ABSTRACT This article considers the relationship between cancer and capitalism from the perspective of political economy. It argues that this perspective is crucial for producing a critical agenda in the sociological study of cancer, which has otherwise and traditionally neglected the question of capital as social totality.
Faisal Al‐Asaad
wiley   +1 more source

On the Security of Lightweight Homomorphic Obfuscation for Protecting Against Hardware Trojans

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Hardware Trojan (HT) attacks pose a critical threat to modern microelectronics by enabling the leakage of sensitive information, such as cryptographic keys, or by inducing functional faults.
Tanvir Hossain   +3 more
doaj   +1 more source

Post‐Humanitarian Militarism and the End of Development: Global Inequality, Security, and the Ethics of Post‐Imperial Solidarity

open access: yesSociology Lens, EarlyView.
ABSTRACT This article traces the transformation of global development from a discourse of aspirational equality to a regime of posthumanitarian militarism. It shows how aid, once framed as solidarity and progress, increasingly operates as an instrument of coercion, surveillance, and containment.
Salvador Santino Regilme
wiley   +1 more source

Counter‐Stigmatization in the Digital Age: The Case of the Sex Tech Award Incident

open access: yesJournal of Management Studies, EarlyView.
Abstract Scholars have shown considerable interest in how organizations manage stigma when powerful actors discredit them and their products. However, research has paid less attention to how organizations might deflect stigma back onto their stigmatizers.
Neva Bojovic   +2 more
wiley   +1 more source

Driven by risk: Understanding reference‐dependent preferences using simulated auto racing

open access: yesJournal of Risk and Insurance, EarlyView.
Abstract Using data from over 56,000 simulated auto races worldwide, we analyze risk‐taking at the margins, consistent with reference‐dependent preferences. We show that participants' risk‐taking changes when a desired intermittent outcome is presented, sometimes at the expense of a more favorable expected end state.
James Hilliard   +2 more
wiley   +1 more source

Why Industrial Internet of Things Platforms Fail: A Structuration Theory Perspective on Platform Evolution

open access: yesJournal of Product Innovation Management, EarlyView.
ABSTRACT Despite their transformative potential, Industrial Internet of Things (IIoT) platforms often fail to evolve into scalable ecosystems. Research on IIoT platforms attributes failure to discrete factors such as governance misalignment or technological complexity and rarely considers how failure unfolds.
Philipp Kernstock   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy